Writen Mid Term Flashcards
- Describe the difference roles of the red, blue, orange, purple teams in a cyber exercise
Red Team: (External team) Attackers
Blue Team: (Internal Team) Protect company resources
Orange Team: End Users
Purple Team: Provides in dept analysis of red-blue team interaction
Works with TTP(tactics, traits, procdeures)
- Give two examples of a vulnerability, threat, risk and asset
Vulnerabilites: upatched system, open ports
Threat: E-mail phishing, zero-day attack
Risk: the probaility of threat exploiting a vulnerability
Asset: proprietary software, company data
- What is the CVE database and the NVD database
CVE – list of entries containing ID#,description,public referance
NVD – US GOV, checklists,flaws,ms configs, national vulnerabilites, database
- Describe the stages of the author’s pentesting process and apply to a scenario
Inteleigence Gathering - looking @ company websites/emails/phone#
Initial foothold - gain access to the network
Local/network enumeration - build a list of devices on the network
Local priviledge escalation – use tool like meterpreter to look for vulnerable + exploitable service paths
Persistence – create reverse listeners/ back up admin account
Internal movement – infecting other devices on the network
Domain Privilege escalation – get the AD hashes
Dumping hashes – john the ripper
Data identification/exfiltration
Reporting
- Describe how you would build your pentesting testing box
Isolated PC running a replica network - OS to attack o Win10 o Server - Tools o Kali o Wireshark o Nesus o Burp o Reconing o Sqlmap o Mimikatz o Etc
- Describe activities you can perform in a passive pentesting scan
Activites that don’t touch the target
Profile Organization -> whois
Profile network -> recon-ng
- What website can be used to view old webpages
Wayback Machine -> archive.org
- Describe activities you can perform in an active pentesting scan
Social Engineering
Banner Grabs
Namp scans
Nessus scans
- Describe common ICMP error codes. (ICMP type 0,3,8)
ICMP type 0 = network unreachable
ICMP type 3 = part unreacable
ICMP type 8 = source host isolated
- If reference to the above question, what can a hacker use ICMP error codes for?
One can map the network
- What information can you gather from DNS recon?
SOA
MX
NS,(name,srv)
Host Record (A, AAAA)
- What is a banner grab?
Scan to an port to gain high level info of ther service offered on the port
- Know the different types of scans NMAP can do and how it does the scan (null, syn, xmas, tcp, version)(indicate TCP flags used)
- Null o Sn o TCP packets with sequence of O and no flag set - SYN o Ss o Sends SYN packets to all ports untill a SYS/ACK is revice from an open port - XMAS o Sx o Fin, VRG o Post flags - TCP o ST o Wait for session to complete three way handshake - Version o Sv o Looks for version through open port
- Know what is returned, when a scan hits an open or closed port or a firewall
Open: SYS/ACK firewall
No firewall closed : RST
- What type of scan will always find a live host?
ARP scan
- Know how to create a python banner grabber
Import sockets S = socket.socket( ) s.connect((IP address) hostname, port)) print s. (V(1024) s.close
- Know the difference and usage of a credentialed and non-credentialed scan
Credentialed – authenticater scan of host allows sources to see problems that (username/password) cant b seen w/o authentication
Non-credential – quick view of vulnerabiliy by looking at services exposed by host
- Describe four methods for making the initial foothold into an organization
Email spear phising -> user clicks on a link or DNS redirection ( user visits malicious website) web server ( Deafault password) Breach Input flaws Input login
- Describe the web environment and common attacks against the servers. (dns, dos, buffer overflow)
DNS – inputs malicious pointer records to point users to you malicious website
DOS – overlaoding post with STU packets
Buffer overflow – overload memory buffer to the point it will run embedded scripts